Microsoft has followed up on the release of its Windows 7 Beta by rolling out another build of the Microsoft Assessment and Planning (MAP) Toolkit.
Intel Corp., known mostly for its hardware chips, has been gradually moving into the software cloud-computing space, with support for IT administrative tasks as its initial target market.
- By Herb Torrens
- 02/05/2009
A debate erupted over the effectiveness of the user account control feature in Microsoft's beta release of Windows 7.
- By Jabulani Leffall
- 02/05/2009
Microsoft plans to rollout four security bulletins for this month's patch cycle on Tuesday, with two "critical" items and two "important" patches on the slate.
- By Jabulani Leffall
- 02/05/2009
EMC and Microsoft formally renewed a partnership on Tuesday, extending their collaborative efforts on virtualization, content management and security solutions for the enterprise market through 2011.
Microsoft has begun aggressively reaching out to the channel to prepare for the release of Windows 7.
- By Scott Bekker
- 02/04/2009
Microsoft described its product lineup plans for its forthcoming Windows 7 operating system launch, expected in early 2010 or possibly earlier.
Windows XP powers "71 percent of PCs within North American and European enterprises," according to a report published last week by Forrester Research.
Xenocode, the Seattle-based maker of virtualization tools, today released the latest version of its Virtual Application Studio, a developer-focused authoring environment for virtualizing existing Windows-based applications.
- By John K. Waters
- 02/02/2009
Insider threats to data security via theft or sabotage are sure to rise, especially as companies increase employee layoffs during a bad economy.
- By Jabulani Leffall
- 02/02/2009
Mr. Roboto uses PowerShell to revamp an old tool.
- By Jeffery Hicks
- 02/01/2009
Unified communications (UC) is an all-encompassing term that describes a variety of applications. While the idea of implementing UC can seem overwhelming, the best approach is to take it bit by bit.
- By Tony Bradley
- 02/01/2009
Joern shows how to design a virtual infrastructure with security in mind.
- By Joern Wettern
- 02/01/2009
Are you? Bogus pop-ups that hide crippling malware can bring networks to their knees. Here are some methods to stop scareware and fix the damages that it inflicts.